Cyber Training for Auditors

Bridge the gap between your first and third lines of defense. Give your auditors the cybersecurity knowledge to identify and assess key risks through the development of more targeted audit programs.

Cyber Audit Skills Accelerator

In this course, auditors learn to manage risk and strengthen security controls while streamlining compliance with information security requirements like GDPR, HIPAA, and SOX. Through hands-on lab activities, students will walk through the hacker lifecycle, explore the malware ecosystem, recognize the principles of endpoint logging and analysis, understand network infrastructure and security, and determine the scope and data of given environments.

Course Topics

The Hacker Lifecycle

This session demystifies the hacker lifecycle, walking attendees through the stages of an attack/intrusion, the elements required for a successful intrusion, and the importance of patch management.

01The Hacker Lifecycle

02The Stages of an Attack

03Patch Management

The Malware Ecosystem

Our instructor guides students through common malware types, infection vectors, persistence mechanisms, and command and control communications.

01Malware Types

02Infection Vectors

03Persistence Mechanisms

Endpoint Logging and Analysis

This session focuses on the importance of event logging and analysis. The course examines the types and purpose of event logs, principles of log analysis, and how to recreate an event timeline.

01Event Logging

02Event Analysis

03Event Timelines

Network Infrastructure and Security

The course closes with a look at network infrastructure and security. Students learn how to baseline normal activity, identify anomalies, and identify the differences between documented and actual network topologies.

01Network Activity

02Security Anomalies

03Network Topologies

Different from the Rest

At Focal Point, we are passionate about building stronger cybersecurity teams.

Flexible Delivery

Focal Point offers multiple training delivery methods - classroom, onsite, and online. Based on your needs, you can use one of our training facilities, go online, or we can bring our team to you.

70% Hands-On

We believe in the power of doing. Lectures are limited, and students spend most of their time building and testing real-world skills in our lab environments.

Top Instructors

Leverage the same world-class training used by cyber experts in the military and Fortune 500. Our instructors receive an average 4.9/5 rating for knowledge and delivery year after year.

Have a question?

Contact Us

Focal Point is excited to take on your biggest data risk challenges. If you'd like to speak to a Focal Point expert or inquire about our services, please fill out the following form.

Featured Insights

Blog

The Top Cybersecurity Jobs in 2019

The top five open positions, described below, can help students understand the opportunities that are available to them, experienced professionals find opportunities for career transitions (like IT to cyber)...

Common Mistakes When Hiring Cyber Professionals

Most organizations didn’t really start building dedicated cybersecurity teams until much later, leaving us with only a few years of hiring data around cybersecurity jobs. That means that for most corporate...